How to Manage System Logs (Configure, Rotate and Import Into Database) in RHEL 7 – Part 5
In order to keep your RHEL 7 systems secure, you need to know how to monitor all of the activities that take place on such
In order to keep your RHEL 7 systems secure, you need to know how to monitor all of the activities that take place on such
Let’s assume that you have 30GB of movies and you have 3 drives each 20 GB in size. So how will you store? Obviously you
Very recently I have written a post on fdupes utility which is used to find and replace duplicate files in Linux. This post was very
Patching a XenServer install is a crucial task to ensure security updates are applied to vulnerable XenServer installs. While in theory the hypervisor is secure
Windows 10 is the newest member of windows NT family of which general availability was made on July 29, 2015. It is the successor of
Today it is a very auspicious occasion for us, guess what? Yes, It is Independence Day here in India and Tecmint community is celebrating its
Some time ago I read that one of the distinguishing characteristics of an effective system administrator / engineer is laziness. It seemed a little contradictory
Our environment consist of one datacenter attached with ISCSI shared storage. This datacenter included one cluster with two hosts/nodes which will be used to host
Here again, I have compiled a list of four things under Linux Tips and Tricks series you may do to remain more productive and entertained
One important task in a network is control and manage staffs web surfing traffics, there are many solutions that can handles this issue, one of
As a system engineer, you will often need to produce reports that show the utilization of your system’s resources in order to make sure that:
It is a common requirement to find and replace duplicate files for most of the computer users. Finding and removing duplicate files is a tiresome